NETMG2

  1. What configuration allows network administrators to manage the network devices using multi-vendor network management products?




    A) SNMP Configurations
  2. What configuration allows network administrators to warn off unauthorized access?




    D) Banners
  3. What configuration allows network administrators to centrally capture critical network events such as fault occurrences?




    C) Logging Configurations
  4. What configurations allows network administrators to better understand the scope of problems related to an interface and allows faster resolution of problems?




    B) Interface Description
  5. What configurations allows network administrators to include networks that are not directly connected to the router into the router's routing table or to manually control the routing of network traffic?




    D) Routing Protocol Configuration and Static Routes Configuration
  6. What configurations allows network administrators to synchronise the clock of all devices so that they can accurately correlate events occurrences between devices?




    D) Network Time Protocol (NTP)
  7. What configurations allows network administrators to deny unwanted access to the network while allowing appropriate access?




    B) Access Control Lists
  8. What configurations allows network administrators to effectively manage information of network administrators for a large network and to automatically keep track of network device configuration changes?




    D) AAA Commands
  9. What configurations allows network administrators to control and predictable service a variety of networked applications and traffic types?




    C) Quality of Service (QoS) Configuration
  10. Image Upload 1

    Using only static routes, what are the manual routing command(s) needed for R1 to R4 such that all sites can be reached from any other sites and all sites can access the Internet via the ISP.
    • R1:
    • ip route 10.20.40.0. 255.255.255.0 192.168.255.6
    • ip route 10.20.50.0 255.255.255.0 192.168.255.10
    • ip route 0.0.0.0 0.0.0.0 10.20.30.2

    • R2:
    • ip route 0.0.0.0 0.0.0.0 192.168.255.5

    • R3: 
    • ip route 0.0.0.0 0.0.0.0 192.168.255.9

    • R4: 
    • ip route 10.20.0.0 255.255.0.0 10.20.30.1
    • ip route 0.0.0.0 0.0.0.0 192.168.255.13
  11. Inventory Management
    It enables the network manager to have all the information about all devices in a central place.

    It is about tracking of hardware and software assets.
  12. Device Configuration Management
    It is about controlling and tracking changes to device configuration.

    It establishes a configuration version control system that maintains the current running configurations of all device and a set number of previous running versions.
  13. Software Management
    It involves planning and executing software image upgrades and patches to single or multiple devices on the network at the same time.

    It is about storing backup copies of all software images running on network devices or any additional software images that should be maintained.
  14. Software Version Control
    It is the practice of developing consistent software versions on similar network devices.

    It limits the amount of software defects and interoperability issues found in the network.

    It makes the enviroment less complex and easier to support.
  15. Change Management
    It aims to reduce the occurrence of non-carrier related outages that are due to unauthorized changes and human error during manual configuration.

    It is a process that provides formal documentation for change requests, review of the proposed change, approval and scheduling of the change, and follow-up review of the change.
  16. What is management information?
    Management information allows managed elements such as hosts, routers, terminal servers, etc., to be monitored and controlled.
  17. What is Management Information Base (MIB)?
    It is a collection of managed objects residing in a virtual information store.

    *SMI describes the common structrures and identification scheme for the definition of management information.
  18. What is the value of the Object Identifier for the following objects: 

    sysUpTime
    sysName
    • sysUpTime => 1.3.6.1.2.1.1.3
    • sysName => 1.3.6.1.2.1.1.5
  19. With aid of tme diagrams, illustrate the typical message(s) exchanged between SNMP entities for each type of SNMP messages.
    Image Upload 2

    • Manager-agent request-respone interaction:
    • Same SNMP domain. Regular polling.

    • Agent-manager unconfirmed interaction:
    • Same SNMP domain. Critical faults.

    • Manager-manager request-response:
    • Between two SNMP domains.

    *SNMPv1: GetRequest, GetNextRequest, GetResponse, SetRequest, Trap

      SNMPv2: added - GetBulkRequestPDU and InformRequestPDU
  20. A standard for SNMP configuration is specified below:
    - Administrative domain one: General
                  - Communtiy string: public
                  - MIB View: Limited to MIB II system group only
                  - MIB Access: Read only
    - Administrative domain two: Network Manager
                  - Community string: et0026
                  - MIB View: Unlimited
                  - MIB Access: Read Write
    - SNMP Trap:
                  - Community string: public
                  -Version: SNMPv1
                  - Trap: Authentication Failure
                  - NMS Trap receiver: 10.32.39.53

    What are the IOS commands to implement the above on a router?
    • snmp-server community public ro
    • snmp-server community et0026 rw 4
    • access-list 4 permit host 10.32.39.53
    • access-list 4 deny any
    • snmp-server host 10.32.30.53 version 2c public
    • snmp-server enable traps snmp authentication
Author
kirin
ID
166818
Card Set
NETMG2
Description
Network Management Tutorial 2
Updated